We review over 10 years of research at Elsevier and various Dutch academic institutions on establishing a new format for the scientific research article. Our work rests on two main theoretical principles: the concept of modular documents, consisting of content elements that can exist and be published independently and are linked by meaningful relations, and the use of semantic data standards allowing access to heterogeneous data. We discuss the application of these concepts in five different projects: a modular format for physics articles, an XML encyclopedia in pharmacology, a semantic data integration project, a modular format for computer science proceedings papers, and our current work on research articles in cell biology.
DOCUMENT
This publication gives an account of the Public Annotation of Cultural Heritage research project (PACE) conducted at the Crossmedialab. The project was carried out between 1 January 2008 and 31 December 2009, and was funded by the Ministry of Education, Culture, and Science. Three members of the Dutch Association of Science Centres (Vereniging Science Centra) actively participated in the execution of the project: the Utrecht University Museum, the National Museum of Natural History (Naturalis), and Museon. In addition, two more knowledge institutes participated: Novay and the Utrecht University of Applied Sciences. BMC Consultancy and Manage¬ment also took part in the project. This broad consortium has enabled us to base the project on both knowledge and experience from a practical and scientific perspective. The purpose of the PACE project was to examine the ways in which social tagging could be deployed as a tool to enrich collections, improve their acces¬sibility and to increase visitor group involvement. The museums’ guiding question for the project was: ‘When is it useful to deploy social tagging as a tool for the benefit of museums and what kind of effect can be expected from such deployment?’ For the Crossmedialab the PACE project presented a unique opportunity to conduct concrete research into the highly interesting phenomenon of social tagging with parties and experts in the field.
DOCUMENT
In dit abstract wordt de ontwikkeling van een online onderwijsmodule beschreven gericht op eHealth voor leefstijlverbetering
MULTIFILE
Adverse Outcome Pathways (AOPs) are conceptual frameworks that tie an initial perturbation (molecular initiat- ing event) to a phenotypic toxicological manifestation (adverse outcome), through a series of steps (key events). They provide therefore a standardized way to map and organize toxicological mechanistic information. As such, AOPs inform on key events underlying toxicity, thus supporting the development of New Approach Methodologies (NAMs), which aim to reduce the use of animal testing for toxicology purposes. However, the establishment of a novel AOP relies on the gathering of multiple streams of evidence and infor- mation, from available literature to knowledge databases. Often, this information is in the form of free text, also called unstructured text, which is not immediately digestible by a computer. This information is thus both tedious and increasingly time-consuming to process manually with the growing volume of data available. The advance- ment of machine learning provides alternative solutions to this challenge. To extract and organize information from relevant sources, it seems valuable to employ deep learning Natural Language Processing techniques. We review here some of the recent progress in the NLP field, and show how these techniques have already demonstrated value in the biomedical and toxicology areas. We also propose an approach to efficiently and reliably extract and combine relevant toxicological information from text. This data can be used to map underlying mechanisms that lead to toxicological effects and start building quantitative models, in particular AOPs, ultimately allowing animal-free human-based hazard and risk assessment.
DOCUMENT
In this case study, we want to gain insight into how residents of three municipalities communicate about the new murder scenario of the cold case of Marianne Vaatstra and the possibility of a large-scale DNA familial searching. We investigate how stakeholders shape their arguments in conversation with each other and with the police. We investigate the repertoires that participants use to achieve certain effects in their interactions with others in three focus groups. The results show that the analyzed repertoires are strong normative orientated. We see two aspects emerge that affect the support for large-scale DNA familial searching. These are: 1. Cautious formulations: respondents showed restraint in making personal judgments and often formulated these on behalf of others. Participants would not fully express themselves, but adjusted to what seemed the socially desirable course. 2. Collective identity: respondents focused on the similarities between themselves and the needs, interests, and goals of other participants. Participants also tried in a discursive way to convince each other to participate in the large-scale familial searching. These two major discursive activities offered the communication discipline guidance for interventions into the subsequent communication strategy.
DOCUMENT
In this case study, we want to gain insights into how residents of three municipalities communicate about the new murder scenario of the cold case of Marianne Vaatstra and the possibility of a large-scale DNA familial searching. We investigate how stakeholders shape their arguments in conversation with each other and with the police. We investigate the repertoires that participants use to achieve certain effects in their interactions with others in three focus groups. The results show that the analyzed repertoires are strong normative orientated. We see two aspects emerge that affect the support for large-scale DNA familial searching. These are: 1. Cautious formulations: respondents showed restraint in making personal judgments and often formulated these on behalf of others. Participants would not fully express themselves, but adjusted to what seemed the socially desirable course. 2. Collective identity: respondents focused on the similarities between themselves and the needs, interests, and goals of other participants. Participants also tried in a discursive way to convince each other to participate in the large-scale familial searching. These two major discursive activities offered the communication discipline guidance for interventions into the subsequent communication strategy.
MULTIFILE
Author Supplied: In the last decades, architecture has emerged as a discipline in the domain of Information Technology (IT). A well-accepted definition of architecture is from ISO/IEC 42010: "The fundamental organization of a system, embodied in its components, their relationships to each other and the environment, and the principles governing its design and evolution." Currently, many levels and types of architecture in the domain of IT have been defined. We have scoped our work to two types of architecture: enterprise architecture and software architecture. IT architecture work is demanding and challenging and includes, inter alia, identifying architectural significant requirements (functional and non-functional), designing and selecting solutions for these requirements, and ensuring that the solutions are implemented according to the architectural design. To reflect on the quality of architecture work, we have taken ISO/IEC 8402 as a starting point. It defines quality as "the totality of characteristics of an entity that bear on its ability to satisfy stated requirements". We consider architecture work to be of high quality, when it is effective; when it answers stated requirements. Although IT Architecture has been introduced in many organizations, the elaboration does not always proceed without problems. In the domain of enterprise architecture, most practices are still in the early stages of maturity with, for example, low scores on the focus areas ‘Development of architecture’ and ‘Monitoring’ (of the implementation activities). In the domain of software architecture, problems of the same kind are observed. For instance, architecture designs are frequently poor and incomplete, while architecture compliance checking is performed in practice on a limited scale only. With our work, we intend to contribute to the advancement of architecture in the domain of IT and the effectiveness of architecture work by means of the development and improvement of supporting instruments and tools. In line with this intention, the main research question of this thesis is: How can the effectiveness of IT architecture work be evaluated and improved?
DOCUMENT
The main question in this PhD thesis is: How can Business Rules Management be configured and valued in organizations? A BRM problem space framework is proposed, existing of service systems, as a solution to the BRM problems. In total 94 vendor documents and approximately 32 hours of semi-structured interviews were analyzed. This analysis revealed nine individual service systems, in casu elicitation, design, verification, validation, deployment, execution, monitor, audit, and version. In the second part of this dissertation, BRM is positioned in relation to BPM (Business Process Management) by means of a literature study. An extension study was conducted: a qualitative study on a list of business rules formulated by a consulting organization based on the Committee of Sponsoring Organizations of the Treadway Commission risk framework. (from the summary of the Thesis p. 165)
DOCUMENT
This document presents the findings of a study into methods that can help counterterrorism professionals make decisions about ethical problems. The study was commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoeken Documentatiecentrum, WODC) of the Dutch Ministry of Security and Justice (Ministerie van Veiligheid en Justitie), on behalf of the National Coordinator for Counterterrorism and Security (Nationaal Coördinator Terrorismebestrijding en Veiligheid,NCTV). The research team at RAND Europe was complemented by applied ethics expert Anke van Gorp from the Research Centre for Social Innovation (Kenniscentrum Sociale Innovatie) at Hogeschool Utrecht. The study provides an inventory of methods to support ethical decision-making in counterterrorism, drawing on the experience of other public sectors – healthcare, social work, policing and intelligence – and multiple countries, primarily the Netherlands and the United Kingdom
DOCUMENT
The Dutch conservation area Oostvaardersplassen was initiated as a rewilding project within the Netherlands’ protected area network. It came under the spotlight when management strategies and practices were criticized by scientists, conservation practitioners, and the public, from a number of perspectives – not all of which were compatible. This article reviews the origin, evolution, and application of the rewilding concept and examines the Oostvaardersplassen project as a case study. Our assessment demonstrates that the area was never an appropriate site for rewilding, beset by rudderless management, and led to a situation that was ecologically and ethically untenable. The case study is used to illustrate humanity’s evolving role in environmental protection where advances in the understanding of ecological complexity, animal behavior, and sentience, cannot be ignored when addressing environmental protection, problem solving, and management. Finally, it lays out options for the future in the absence of the three Cs of rewilding, the Cores, Corridors, Carnivores, and introduces the concept of the fourth C, Compassion. https://ijw.org/learning-to-rewild/ LinkedIn: https://www.linkedin.com/in/helenkopnina/
MULTIFILE